Incorrect Privilege Assignment | |
Improper Preservation of Consistency Between Independent Representations of Shared State | |
Use of Less Trusted Source | |
Time-of-check Time-of-use (TOCTOU) | |
SQL Injection | |
Use of a Broken or Risky Cryptographic Algorithm | |
SQL Injection | |
Integer Overflow or Wraparound | |
Incomplete Cleanup | |
Integer Overflow or Wraparound | |
Improper Initialization | |
Link Following | |
Link Following | |
Insufficiently Protected Credentials | |
Improper Authentication | |
Improper Authorization | |
Missing Authorization | |
Improper Input Validation | |
Untrusted Pointer Dereference | |
Integer Overflow or Wraparound | |
Incorrect Calculation of Buffer Size | |
Incorrect Calculation of Buffer Size | |
Information Exposure | |
Unchecked Error Condition | |
Use After Free | |
Improper Synchronization | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Improper Synchronization | |
Time-of-check Time-of-use (TOCTOU) | |
Missing Authorization | |
Integer Overflow or Wraparound | |
Function Call With Incorrect Argument Type | |
Resource Exhaustion | |
Buffer Overflow | |
SQL Injection | |
Improper Input Validation | |
Improper Input Validation | |
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
Incomplete Cleanup | |
Insufficiently Protected Credentials | |
SQL Injection | |
Improper Initialization | |
Improper Initialization | |
Improper Initialization | |
Improper Initialization | |
Improper Initialization | |
Improper Initialization | |
Improper Initialization | |
Improper Initialization | |
Improper Initialization | |
Improper Initialization | |
Improper Authentication | |
Improper Authentication | |
Improper Authentication | |
Improper Authentication | |
Improper Authentication | |
Improper Authentication | |
Improper Authentication | |
Improper Authentication | |
Improper Authentication | |
Improper Authentication | |
Improper Authentication | |
Improper Authentication | |
Improper Authentication | |
Improper Authentication | |
Insufficiently Protected Credentials | |
Insufficiently Protected Credentials | |
Insufficiently Protected Credentials | |
Insufficiently Protected Credentials | |
Insufficiently Protected Credentials | |
Insufficiently Protected Credentials | |
Insufficiently Protected Credentials | |
Insufficiently Protected Credentials | |
Insufficiently Protected Credentials | |
Insufficiently Protected Credentials | |
Insufficiently Protected Credentials | |
Insufficiently Protected Credentials | |
Insufficiently Protected Credentials | |
Insufficiently Protected Credentials | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Incorrect Calculation of Buffer Size | |
Incorrect Calculation of Buffer Size | |
Incorrect Calculation of Buffer Size | |
Incorrect Calculation of Buffer Size | |
Incorrect Calculation of Buffer Size | |
Incorrect Calculation of Buffer Size | |
Incorrect Calculation of Buffer Size | |
Incorrect Calculation of Buffer Size | |
Incorrect Calculation of Buffer Size | |
Incorrect Calculation of Buffer Size | |
Incorrect Calculation of Buffer Size | |
Incorrect Calculation of Buffer Size | |
Incorrect Calculation of Buffer Size | |
Incorrect Calculation of Buffer Size | |
Incorrect Calculation of Buffer Size | |
Incorrect Calculation of Buffer Size | |
Incorrect Calculation of Buffer Size | |
Incorrect Calculation of Buffer Size | |
Incorrect Calculation of Buffer Size | |
Incorrect Calculation of Buffer Size | |
Incorrect Calculation of Buffer Size | |
Incorrect Calculation of Buffer Size | |
Incorrect Calculation of Buffer Size | |
Incorrect Calculation of Buffer Size | |
Incorrect Calculation of Buffer Size | |
Incorrect Calculation of Buffer Size | |
Incorrect Calculation of Buffer Size | |
Incorrect Calculation of Buffer Size | |
Incorrect Calculation of Buffer Size | |
Incorrect Calculation of Buffer Size | |
Incorrect Calculation of Buffer Size | |
Incorrect Calculation of Buffer Size | |
Incorrect Calculation of Buffer Size | |
Incorrect Calculation of Buffer Size | |
Incorrect Calculation of Buffer Size | |
Incorrect Calculation of Buffer Size | |
Incorrect Calculation of Buffer Size | |
Incorrect Calculation of Buffer Size | |
Incorrect Calculation of Buffer Size | |
Incorrect Calculation of Buffer Size | |
Incorrect Calculation of Buffer Size | |
Incorrect Calculation of Buffer Size | |
Incorrect Calculation of Buffer Size | |
Incorrect Calculation of Buffer Size | |
Incorrect Calculation of Buffer Size | |
Incorrect Calculation of Buffer Size | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Unchecked Error Condition | |
Unchecked Error Condition | |
Unchecked Error Condition | |
Unchecked Error Condition | |
Unchecked Error Condition | |
Unchecked Error Condition | |
Unchecked Error Condition | |
Unchecked Error Condition | |
Unchecked Error Condition | |
Unchecked Error Condition | |
Unchecked Error Condition | |
Unchecked Error Condition | |
Unchecked Error Condition | |
Unchecked Error Condition | |
Unchecked Error Condition | |
Unchecked Error Condition | |
Unchecked Error Condition | |
Unchecked Error Condition | |
Unchecked Error Condition | |
Unchecked Error Condition | |
Unchecked Error Condition | |
Unchecked Error Condition | |
Unchecked Error Condition | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Improper Synchronization | |
Improper Synchronization | |
Improper Synchronization | |
Improper Synchronization | |
Improper Synchronization | |
Improper Synchronization | |
Improper Synchronization | |
Improper Synchronization | |
Improper Synchronization | |
Improper Synchronization | |
Improper Synchronization | |
Improper Synchronization | |
Improper Synchronization | |
Improper Synchronization | |
Improper Synchronization | |
Improper Synchronization | |
Improper Synchronization | |
Improper Synchronization | |
Improper Synchronization | |
Improper Synchronization | |
Improper Synchronization | |
Improper Synchronization | |
Improper Synchronization | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Heap-based Buffer Overflow | |
Improper Synchronization | |
Improper Synchronization | |
Improper Synchronization | |
Improper Synchronization | |
Improper Synchronization | |
Improper Synchronization | |
Improper Synchronization | |
Improper Synchronization | |
Improper Synchronization | |
Improper Synchronization | |
Improper Synchronization | |
Improper Synchronization | |
Improper Synchronization | |
Improper Synchronization | |
Improper Synchronization | |
Improper Synchronization | |
Improper Synchronization | |
Improper Synchronization | |
Improper Synchronization | |
Improper Synchronization | |
Improper Synchronization | |
Improper Synchronization | |
Improper Synchronization | |
Integer Overflow or Wraparound | |
Use of a Broken or Risky Cryptographic Algorithm | |
SQL Injection | |
Information Exposure | |
Out-of-bounds Read | |
Permissive Whitelist | |
Improper Input Validation | |
SQL Injection | |
Improper Input Validation | |
Missing Authorization | |
Missing Authorization | |
Missing Authorization | |
Missing Authorization | |
Missing Authorization | |
Missing Authorization | |
Missing Authorization | |
Missing Authorization | |
Missing Authorization | |
Missing Authorization | |
Missing Authorization | |
Missing Authorization | |
Missing Authorization | |
Missing Authorization | |
Missing Authorization | |
Missing Authorization | |
Missing Authorization | |
Missing Authorization | |
Missing Authorization | |
Missing Authorization | |
Missing Authorization | |
Missing Authorization | |
Missing Authorization | |
Improper Authorization | |
Improper Authorization | |
Improper Authorization | |
Improper Authorization | |
Improper Authorization | |
Improper Authorization | |
Improper Authorization | |
Improper Authorization | |
Improper Authorization | |
Improper Authorization | |
Improper Authorization | |
Improper Authorization | |
Improper Authorization | |
Improper Authorization | |
Improper Authorization | |
Improper Authorization | |
Improper Authorization | |
Improper Authorization | |
Improper Authorization | |
Improper Authorization | |
Improper Authorization | |
Improper Authorization | |
Improper Authorization | |
Link Following | |
Link Following | |
Link Following | |
Link Following | |
Link Following | |
Link Following | |
Link Following | |
Link Following | |
Link Following | |
Link Following | |
Link Following | |
Link Following | |
Link Following | |
Link Following | |
Link Following | |
Link Following | |
Link Following | |
Link Following | |
Link Following | |
Link Following | |
Link Following | |
Link Following | |
Link Following | |
Link Following | |
Link Following | |
Link Following | |
Link Following | |
Link Following | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Untrusted Pointer Dereference | |
Untrusted Pointer Dereference | |
Untrusted Pointer Dereference | |
Untrusted Pointer Dereference | |
Untrusted Pointer Dereference | |
Untrusted Pointer Dereference | |
Untrusted Pointer Dereference | |
Untrusted Pointer Dereference | |
Untrusted Pointer Dereference | |
Untrusted Pointer Dereference | |
Untrusted Pointer Dereference | |
Untrusted Pointer Dereference | |
Untrusted Pointer Dereference | |
Untrusted Pointer Dereference | |
Untrusted Pointer Dereference | |
Untrusted Pointer Dereference | |
Untrusted Pointer Dereference | |
Untrusted Pointer Dereference | |
Untrusted Pointer Dereference | |
Untrusted Pointer Dereference | |
Untrusted Pointer Dereference | |
Untrusted Pointer Dereference | |
Untrusted Pointer Dereference | |
Incorrect Authorization | |